2008 |
17 | EE | Peeter Laud:
On the computational soundness of cryptographically masked flows.
POPL 2008: 337-348 |
16 | EE | Peeter Laud,
Long Ngo:
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library.
ProvSec 2008: 298-312 |
2007 |
15 | EE | Ilja Tsahhirov,
Peeter Laud:
Application of Dependency Graphs to Security Protocol Analysis.
TGC 2007: 294-311 |
2006 |
14 | EE | Michael Backes,
Peeter Laud:
Computationally sound secrecy proofs by mechanized flow analysis.
ACM Conference on Computer and Communications Security 2006: 370-379 |
13 | EE | Ahto Buldas,
Peeter Laud,
Jaan Priisalu,
Märt Saarepera,
Jan Willemson:
Rational Choice of Security Measures Via Multi-parameter Attack Trees.
CRITIS 2006: 235-248 |
12 | EE | Peeter Laud,
Tarmo Uustalu,
Varmo Vene:
Type systems equivalent to data-flow analyses for imperative languages.
Theor. Comput. Sci. 364(3): 292-310 (2006) |
2005 |
11 | EE | Peeter Laud:
Secrecy types for a simulatable cryptographic library.
ACM Conference on Computer and Communications Security 2005: 26-35 |
10 | EE | Peeter Laud,
Varmo Vene:
A Type System for Computationally Secure Information Flow.
FCT 2005: 365-377 |
9 | EE | Ahto Buldas,
Peeter Laud,
Märt Saarepera,
Jan Willemson:
Universally Composable Time-Stamping Schemes with Audit.
ISC 2005: 359-373 |
2004 |
8 | EE | Peeter Laud:
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries.
IEEE Symposium on Security and Privacy 2004: 71-85 |
2003 |
7 | EE | Peeter Laud:
Handling Encryption in an Analysis for Secure Information Flow.
ESOP 2003: 159-173 |
6 | EE | Peeter Laud,
Ricardo Corin:
Sound Computational Interpretation of Formal Encryption with Composed Keys.
ICISC 2003: 55-66 |
2002 |
5 | | Ahto Buldas,
Peeter Laud,
Helger Lipmaa:
Eliminating Counterevidence with Applications to Accountable Certificate Management.
Journal of Computer Security 10(3): 273-296 (2002) |
2001 |
4 | EE | Peeter Laud:
Semantics and Program Analysis of Computationally Secure Information Flow.
ESOP 2001: 77-91 |
2000 |
3 | EE | Ahto Buldas,
Peeter Laud,
Helger Lipmaa:
Accountable certificate management using undeniable attestations.
ACM Conference on Computer and Communications Security 2000: 9-17 |
1998 |
2 | EE | Ahto Buldas,
Peeter Laud,
Helger Lipmaa,
Jan Willemson:
Time-Stamping with Binary Linking Schemes.
CRYPTO 1998: 486-501 |
1 | | Ahto Buldas,
Peeter Laud:
New linking schemes for digital time-stamping.
ICISC 1998: 3-13 |